Malware

Type: Keyphrase
Name: Malware
First reported 5 hours ago - Updated 48 mins ago - 2 reports

Threat Outbreak Alert RuleID12082: Email Messages Distributing Malicious Software on October 23, 2014

Entities: Malware, Threat
First reported 9 hours ago - Updated 3 hours ago - 4 reports

Police arrest man thought to be mastermind behind £1.6million cyber raid on cash machines across Britain

A 37-year-old man has been arrested on suspicion of masterminding a £1.6million cyber raid on cash machines.The man is being held by detectives in Portsmouth after the seven-figure haul went missing from a string of ATMs.Detectives believe an organised ... [Published Mail Online UK - 3 hours ago]
First reported 12 hours ago - Updated 4 hours ago - 7 reports

Ebola fears used by hackers

A piece of malware sent via email spam is masquerading as an informative message from the World Health Organization on how to protect yourself against Ebola, according to cybersecurity firm Trustwave. The email, which Trustwave says is part of a spam ... [Published Atlanta Journal And Constitution - 4 hours ago]
First reported 22 hours ago - Updated 6 hours ago - 3 reports

Drigo malware sending stolen government documents to Google Drive

A new piece of malware called Drigo has been found using Google Drive accounts to exfiltrate information from infected computers. The malware uploads Excel, Word, PDF, text and Powerpoint files it finds to Google Drive, even if the documents are in ... [Published HackSurfer Articles - 6 hours ago]
First reported 15 hours ago - Updated 6 hours ago - 3 reports

Hackers targeting mobile phones for banking information

Cyber Security news WASHINGTON, USA: Hackers are increasingly targeting mobile phones to access bank accounts of victims and steal their money, security researchers warn.Targeted malware attacks, mainly against Android phones have increased tenfold with ... [Published Biz Community - 6 hours ago]
First reported Oct 22 2014 - Updated 10 hours ago - 6 reports

CryptoWall ransom infections spike to 830,000 in matter of weeks

The malware that just won't go away Dell SecureWorks has updated its figures on the number of PCs infected by the awful CryptoWall ransom malware and the news isn’t good – the number of systems has spiked suddenly to 830,000. The firm’s , itself a large ... [Published Techworld.com - 10 hours ago]
First reported Oct 22 2014 - Updated 12 hours ago - 4 reports

Ebola advice emails from 'World Health Organization' are malware spam

If you’ve got an email in your inbox from the World Health Organization offering “information and prevention” tips about Ebola, don’t click on its attachment – you’re likely to end up with a nasty digital infection.Cybercriminals are using the current ... [Published NewsRT.co.uk - 14 hours ago]
First reported Oct 21 2014 - Updated Oct 22 2014 - 6 reports

Threat Outbreak Alert RuleID12065: Email Messages Distributing Malicious Software on October 22, 2014

Entities: Malware, Threat
First reported Oct 22 2014 - Updated Oct 22 2014 - 5 reports

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

Optical Sensors Manufacturer Seamlessly Extends Cloud-Delivered Security to Largely Mobile WorkforceSAN FRANCISCO--(EON: Enhanced Online News“OpenDNS has not only helped us reduce the malware infection rate for systems on our network from 20 percent to ... [Published EON: Enhanced Online News - Oct 22 2014]
First reported Oct 21 2014 - Updated Oct 22 2014 - 4 reports

Malware directs stolen documents to Google Drive

Researchers have uncovered a new type of information-stealing malware that is apparently used in campaigns targeting government agencies and can syphon files from compromised computers to Google Drive.Dubbed Drigo, the malware uploads Excel, Word, PDF, ... [Published Net Security - Oct 22 2014]
First reported Oct 21 2014 - Updated Oct 22 2014 - 9 reports

60% of Android attacks use financial malware

Malicious programs targeting Android-based devices in order to steal money were used in 60 percent of attempted attacks registered by Kaspersky Lab security products, according to a survey by Kaspersk... ... [Published Help Net Security - News - Oct 22 2014]
First reported Oct 21 2014 - Updated Oct 21 2014 - 6 reports

Hacking ATMs: No Malware Required

Inexpensive Computer Used to Directly Control Cash Dispenser Researchers demonstrate how ATMs could be hacked - without installing malware - by connecting a tiny computer to an inside port, bypassing the ATM's own computer and instructing the cash dispenser ... [Published CareersInfoSecurity.com - Oct 21 2014]

Quotes

...new communication medium -- and brand owners need to ensure they have the highest level of security built in," said Gary Steele, CEO at Proofpoint. "With the acquisition of Nexgate, Proofpoint extends its world class security and compliance capabilities into an expanding set of social communication platforms. Today's acquisition further solidifies Proofpoint's leading position in providing next-generation technology to protect against the most advanced threats facing the modern enterprise across all communication channels."
...said Devin Redmond, Nexgate co-founder and former chief executive officer, now vice president and general manager of Nexgate for Proofpoint. "We have already remediated more than 12 million risky social items and our customers save an average of 100 days in manual moderation and remediation time. Adding Proofpoint's advanced threat detection capabilities, archiving and retention technologies to the platform will further cement our leadership in the growing social media market. We are pleased to bring this combined technology and broader market presence to new and existing partners and customers alike."
"Our customers are constantly pulling Silo into new business processes. By moving the browser to the cloud and by extending the environment with a policy and configuration capability, they have embraced Silo across industries and roles." Researchers Have Additional Requirements An early step in the information security research process is to access web content using the browser, Petry...
...Again, the victims are saddled with SEDNIT/Sofacy malware. "Our investigation into Pawn Storm has shown that the attackers have done their homework. Their choices of targets and the use of SEDNIT malware indicate the attackers are very experienced; SEDNIT has been designed to penetrate their targets’ defenses and remain persistent in order to capture as much information as they can" the researchers noted

More Content

All (13553) | News (7087) | Reports (3) | Blogs (6436) | Audio/Video (1) | Fact Sheets (4) | Press Releases (17)
sort by: Date | Relevance
Proofpoint Signs Definitive Agreement to Acquir... [Published BusinessWeek - 39 mins ago]
Proofpoint : Signs Definitive Agreement to Acqu... [Published 4 Traders - 45 mins ago]
Rubicon Project Announces Record Financial Results [Published Wall Street Select - 47 mins ago]
Threat Outbreak Alert RuleID12082: Email Messag... [Published Threat Outbreak Alerts - 48 mins ago]
Authentic8 Enhances Its Secure Browser Session ... [Published eWeek - 54 mins ago]
Assistant Attorney General Leslie R. Caldwell S... [Published United States Department of Justice - 1 hour ago]
Malvertising impacts Yahoo, AOL visitors, sprea... [Published SC Magazine US - 1 hour ago]
Check Point Software Technologies' (CHKP) CEO G... [Published Seeking Alpha - 1 hour ago]
Re[2]: IE can not open. [Published Storage IT Toolbox - 1 hour ago]
SEDNIT malware delivered in 'Operation Pawn Storm' [Published Latest articles from SC Magazine News - 2 hours ago]
See Clearly in the Cloud Through Self-Service S... [Published Security Intelligence - 2 hours ago]
Operation Pawn Storm: Varied targets and attack... [Published Net Security - 2 hours ago]
nandp_demo_page [Published Trusteer - 2 hours ago]
University of Nebraska Hit by Spammers [Published Media Post - 2 hours ago]
Top 5 Security Apps for iPhone 6 [Published Security Products - 2 hours ago]
UserInsight's New User Statistics Provide Great... [Published SecurityStreet - 3 hours ago]
The Best Browser Privacy Tools (That Don’t Make... [Published TIME.com - 3 hours ago]
The Best Browser Privacy Tools (That Don’t Make... [Published Real Clear Politics - TIME.com - 3 hours ago]
OPC - UA makes subsea control more secure [Published Digital Energy Journal - 3 hours ago]
Police arrest man thought to be mastermind behi... [Published Mail Online UK - 3 hours ago]
A Simple Way to Limit Your Risk of Credit Card ... [Published Wyatt Investment Research - 4 hours ago]
Thursday Buzz: We’re OK With Ads on Our Apps [Published Associations Now - 4 hours ago]
Ebola fears used by hackers [Published Atlanta Journal And Constitution - 4 hours ago]
Deadly Ebola virus is now infecting computers [Published Daily Star - 4 hours ago]
Ebola fears used by hackers [Published Town Hall - 4 hours ago]
Hackers use Ebola outbreak to trick users into ... [Published TheInquirer.net - 4 hours ago]
Eight 'very high severity' open source and thir... [Published ITProPortal.com - 4 hours ago]
Cybercriminals use Ebola fears to hack computers [Published Stock Nod - 4 hours ago]
Cybercriminals use Ebola fears to hack computers [Published Wall Street Business Network - 4 hours ago]
Chipmaker deliberately cripples user devices wi... [Published CSO Magazine - 4 hours ago]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Threat Outbreak Alert RuleID12082: Email Messag... [Published Threat Outbreak Alerts - 48 mins ago]
...
SEDNIT malware delivered in 'Operation Pawn Storm' [Published Latest articles from SC Magazine News - 2 hours ago]
Military, governments and media from around the world are targets in a campaign identified by Trend Micro. ...
See Clearly in the Cloud Through Self-Service S... [Published Security Intelligence - 2 hours ago]
It’s cloudy everywhere, which means staying away from the cloud is no longer an option. However, with its many benefits, why would you want a clear sky? Of course, you can reap those benefits only if you keep your enterprise secure. Security has proven ...
UserInsight's New User Statistics Provide Great... [Published SecurityStreet - 3 hours ago]
div class="jive-rendered-content"> Nate Silver made statistics sexy, and we're riding that wave. But seriously, breaking down some of the more noisy alerts on the network by users and showing you spikes can really help you detect and investigate unusual ...
The Best Browser Privacy Tools (That Don’t Make... [Published TIME.com - 3 hours ago]
In a year when social media giants and governments alike have made headlines for tracking users online without their consent, battening down the virtual hatches has become a vital part of Internet hygiene. Blocking tracking technologies, however, ...
1 2 3 4 5 6 7 8 9 10 ...

Audio/Video

sort by: Date | Relevance
TECH PM - Videogame Console Sales Remain Strong [Published Wall Street Journal Tech News Briefing - May 16 2014]
1

Press Releases

sort by: Date | Relevance
Bit9 + Carbon Black Free Webinar: "The Need for... [Published GlobeNewswire: Acquisitions News - Oct 17 2014]
The Home Depot Completes Malware Elimination an... [Published Financial Services - Sep 18 2014]
Press release: Government supports UK's next ge... [Published Keeping the UK safe in cyber space - Activity o ... - Sep 03 2014]
The UPS Store, Inc. Notifies Customers Of Poten... [Published GlobeNewswire: Acquisitions News - Aug 20 2014]
MRG Effitas Awards Wontok SafeCentral New Real ... [Published GlobeNewswire: Acquisitions News - Jul 21 2014]
1 2 3 4
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.